Placing the Suspect Behind the Keyboard
Using Digital Forensics and Investigative Techniques to Identify Cybercrime SuspectsBy
- Brett Shavers
Placing the Suspect Behind the Keyboard is the definitive book on conducting a complete investigation of a cybercrime using digital forensics techniques as well as physical investigative procedures. This book merges a digital analysis examiner's work with the work of a case investigator in order to build a solid case to identify and prosecute cybercriminals.
Brett Shavers links traditional investigative techniques with high tech crime analysis in a manner that not only determines elements of crimes, but also places the suspect at the keyboard. This book is a first in combining investigative strategies of digital forensics analysis processes alongside physical investigative techniques in which the reader will gain a holistic approach to their current and future cybercrime investigations.
Information Security professionals of all levels, digital forensic examiners and investigators, IT managers, InfoSec consultants, criminologists, sociologists, attorneys, law enforcement officers, Also can sell to forensic training vendors, government training courses, and high-tech crime associations.
Paperback, 320 Pages
Published: February 2013
"I would highly recommend the book to anyone in the field of digital investigation, computer forensics, or who may just have an interest in the fascinating world of cybercrime investigation. This is a must read for any aspiring novice cybercrime investigator and the seasoned professional computer guru as well as a needed addition to any digital investigatorâs library."--Journal of Digital Forensics, Security and Law, Volume 8(2), 2013 "This book offers a complete picture of a cybercrime investigation, and with the author's clear and interesting writing, it manages to give aspiring digital forensic investigators a good idea of what such a job entails when working with law enforcement. It's a very easy and engaging read."-- Help Net Security online,September 5, 2013
Chapter 1. Introduction
Chapter 2. High Tech Interview
Chapter 3. Physical Investigations
Chapter 4. Technical Investigations
Chapter 5. Putting it all Together
Chapter 6. Investigative Case Management
Chapter 7. Case Presentation
Chapter 8. Cheat Sheets and Quickstart Guides
Chapter 9. Some Things will Become Easier, Others Not So Much
Chapter 10. Online Investigations
Chapter 11. Case Studies